Detectionlowtest
MSSQL Server Failed Logon
Detects failed logon attempts from clients to MSSQL server.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Nasreddine Bencherchali (Nextron Systems), j4sonCreated Wed Oct 11Updated Wed Jun 26218d2855-2bba-4f61-9c85-81d0ea63ac71windows
Log Source
Windowsapplication
ProductWindows← raw: windows
Serviceapplication← raw: application
Definition
Requirements: Must enable MSSQL authentication.
Detection Logic
Detection Logic1 selector
detection:
selection:
Provider_Name|contains: 'MSSQL' # Note: We use contains to account for other third party providers - See https://github.com/SigmaHQ/sigma/issues/4876
EventID: 18456
condition: selectionFalse Positives
This event could stem from users changing an account's password that's used to authenticate via a job or an automated process. Investigate the source of such events and mitigate them
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
218d2855-2bba-4f61-9c85-81d0ea63ac71
Status
test
Level
low
Type
Detection
Created
Wed Oct 11
Modified
Wed Jun 26
Path
rules/windows/builtin/application/mssqlserver/win_mssql_failed_logon.yml
Raw Tags
attack.credential-accessattack.t1110